sensors-logo

Journal Browser

Journal Browser

Security and Privacy in IoT and Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (30 April 2022) | Viewed by 2198

Special Issue Editor


E-Mail Website
Guest Editor
Escuela Técnica Superior de Ingenieros de Telecomunicación, Universidad Politécnica de Madrid, Madrid, Spain
Interests: internet of things, blockchain technologies, cyber physical systems, knowledge management, information retrieval

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) has emerged as one of the most important emerging technologies in recent years. IoT can be thought of as a complex heterogenous ecosystem of interconnected devices that can communicate with each other and with other platforms, in most cases using the Internet. These smart devices are capable of collecting, processing, analyzing, and sharing information.

The literature states that there are around 35 billion IoT devices in 2021 and, going forward, this number is estimated to increase to 75 billion by 2025. Therefore, IoT is growing at a tremendous pace and so are the application scenarios, use cases, and technologies surrounding it. Due to the heterogeneity of devices in the IoT environment, they can be compromised by attackers, so the use of cryptographic primitives (symmetric and asymmetric algorithms, one-way hash functions, blockchain technology, PUF, technology, etc.) is essential to build secure IoT platforms.

In addition, IoT devices and sensors are deployed in most cases in open networks, or in home networks with little or very little security, which makes them vulnerable to physical attacks, compromising user and corporate information. Therefore, how to implement and store cryptographic primitives in IoT devices has grown significantly in importance. Improper implementation of security policies and algorithms can make IoT devices vulnerable to all kinds of attacks, such as physical attacks like side-channel attacks, while improper storage of secrets in the devices' memory can lead to another type of physical attack, such as memory attack. Another possible attack vector could be the devices themselves, devices with a faulty or outdated design can be a good target for attackers, it would therefore be desirable to have guidelines, best practices or design patterns for the development of IoT devices to ensure that they are secure and ensuring privacy in their construction. Other types of attacks come from bugs in the development of the applications and software that support the IoT devices or platform. As an example, if a device provides a front-end web application, flaws in that application would allow attackers to access the devices and information, even allowing them to steal credentials and access the device and the IoT network.

This special issue aims to publish research and scientific implementations that contribute to secure detection, secure key generation, secure identification, efficient authentication, privacy assurance, and secure communication from a cyber-physical security point of view in the IoT network. Authors can submit papers in the areas of hardware or software security, cyber/physical security approaches for cyber-physical systems, efficient design and implementation of PUFs, cryptographic protocols, machine learning and IoT security, attacks and cryptanalysis of PUFs, effective software designs for security and privacy, best practices and software design patterns for IoT devices, blockchain-based protocols, and other related areas.

Dr. Diego Martín
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT 
  • Security 
  • Privacy 
  • IoT attacks 
  • Cryptography

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 475 KiB  
Article
Detecting Cyberattacks on Electrical Storage Systems through Neural Network Based Anomaly Detection Algorithm
by Giovanni Battista Gaggero, Roberto Caviglia, Alessandro Armellin, Mansueto Rossi, Paola Girdinio and Mario Marchese
Sensors 2022, 22(10), 3933; https://doi.org/10.3390/s22103933 - 23 May 2022
Cited by 9 | Viewed by 1701
Abstract
Distributed Energy Resources (DERs) are growing in importance Power Systems. Battery Electrical Storage Systems (BESS) represent fundamental tools in order to balance the unpredictable power production of some Renewable Energy Sources (RES). Nevertheless, BESS are usually remotely controlled by SCADA systems, so they [...] Read more.
Distributed Energy Resources (DERs) are growing in importance Power Systems. Battery Electrical Storage Systems (BESS) represent fundamental tools in order to balance the unpredictable power production of some Renewable Energy Sources (RES). Nevertheless, BESS are usually remotely controlled by SCADA systems, so they are prone to cyberattacks. This paper analyzes the vulnerabilities of BESS and proposes an anomaly detection algorithm that, by observing the physical behavior of the system, aims to promptly detect dangerous working conditions by exploiting the capabilities of a particular neural network architecture called the autoencoder. The results show the performance of the proposed approach with respect to the traditional One Class Support Vector Machine algorithm. Full article
(This article belongs to the Special Issue Security and Privacy in IoT and Sensor Networks)
Show Figures

Figure 1

Back to TopTop